All the latest UK technology news, reviews and analysis


Latest security analysis

Toy soldiers standing on a laptop

US and UK cyber war games will not stop the hacker army

Sony breach proves the need for stronger defence tests, argues security community

hunting-money-net-cartoon

Microsoft accused of money-grabbing with Patch Tuesday reform

Solution lies in virtual patching alternatives, says security community

Security padlock image

NSA efforts to crack VPN encryption are not the end of the world

Security community says there are still ways to stay private

Big data offers big benefits but privacy concerns must be addressed

The use of big data will pose many questions for companies, but the rewards are worth it

How to protect mobile data

Key ways your business can stay free of data breaches and shadow IT

Regin malware: Victims, implications and defence measures

What we currently know about the world's latest cyber threat

WireLurker iOS malware drags Apple into mobile security mire

Palo Alto Networks discovery could cause a major shift in how iOS is viewed by IT teams

ATM malware thefts the 'modern day bank robbery' raking in millions for crooks

Criminals see easy money in targeting the hole in the wall

HP predicts fractured future for BYOD adoption

Chief technologist says flexibility will drive BYOD, although approaches will be diverse

Bash Shellshock bug puts servers, SCADA and web world at risk

Expect targeted attacks on governments, industry and critical infrastructure warns security experts

V3 Security Summit: Skills gap puts the future of UK cyber security at risk

Manifestos, objectives, programs and apprentices all herald a demand for digital skills

V3 Security Summit: Botnet barbarians will breach businesses' perimeters

Upgrade security and call for allies or risk disaster, say industry experts

How to secure the Internet of Things

Sensors collecting IoT data will provide a fresh attack vector for hostile parties

Cloud data security strife receives a silver bullet from HyTrust and Intel

Boundary Controls uses Intel technology to keep sensitive data in the right place

Tor hack casts doubt on safety and security of 'hidden' network

Law enforcement and research community will find ways get you, warn security experts

Java issues could mark the beginning of the end for die-hard Windows XP users

Latest Java patches may not work on XP, leaving users vulnerable to attack, security experts warn

Law agencies shift cyber crime focus to those behind online scams

Spate of charges against individuals shows a new focus from law agencies worldwide

OpenSSL Heartbleed bug leaves tech community in tatters

Windows XP support ends but it's open source tech that causes grief for the web world

How to make your big data smart, useful and accurate

Tech execs chew over the definition of 'datability' at CeBIT

Hackers hoarding Windows XP exploits for cut-off bonanza

Security community unanimous: there will be hacks

Tesco and Kickstarter data thefts pose double trouble for web users

Data stolen from crowdfunding site will be used to mount follow-up attacks, warns security community

Arresting hackers more effective than botnet takedowns for tackling cybercrime

Black Hole creator's guilty plea proves effectiveness of hunting hackers

PRISM: Fallout from NSA internet spying scandal will linger throughout 2014

Governments risk disaster with lack of transparency into snooping spooks

Previous 1 3 4 5 6 7 8 Next

Popular Threads

Powered by Disqus
LG G Flex 2 hands-on review

CES 2015: LG G Flex 2 video

A closer look at LG's latest curved-screen smartphone

Updating your subscription status Loading
Newsletters

Get the latest news (daily or weekly) direct to your inbox with V3 newsletters.

newsletter sign-up button
mubaloo2

Beacon technology: what are the opportunities and how does the technology work?

This paper seeks to provide education and technical insight to beacons, in addition to providing insight to Apple's iBeacon specification

ibmv3may

Converting big data and analytics insights into results

Successful leaders are infusing analytics throughout their organisations to drive smarter decisions, enable faster actions and optimise outcomes

Head of Digital Product Management

Head of Digital Product Management is required for a...

Front End UI / UX Developer - HTML5 - Big Data Analytics

Front End UI / UX Developer - HTML5 - Big Data Analytics...

Software Trainer - Marketing Data Analysis & Automation Software

Software Trainer - Marketing Data Analysis & Automation...

Technical Support Consultant -SQL- Marketing Analysis/Automation

SaaS / Technical Support Consultant - SQL - Marketing...